blockchain
![building blocks](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111907/building_blocks-400x200.jpg)
Researchers develop data exchange approach with blockchain-based security features
An IT startup has developed a novel blockchain-based approach for secure linking of databases, called ChainifyDB. “Our software resembles keyhole surgery. With a barely …
![cryptocurrency](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101752/cryptocurrency-400x200.jpg)
Cryptocurrency crime losses more than double to $4.5 billion in 2019
Cryptocurrency users, exchanges and investors suffered $4.5 billion in crypto-related losses resulting from thefts, hacks, and fraud, a CipherTrace report reveals. …
![blockchain](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100809/blockchain-400x200.jpg)
Benefits of blockchain pilot programs for risk management planning
Through 2022, 80% of supply chain blockchain initiatives will remain at a proof-of-concept (POC) or pilot stage, according to Gartner. One of the main reasons for this …
![light](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100048/light-400x200.jpg)
Companies risk revenue growth due to innovation achievement gap
While a majority of CEOs express strong confidence in the effectiveness of their current IT systems, most are struggling to close the innovation achievement gap to drive …
![businessman](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103112/businessman-400x200.jpeg)
Six trends attracting the attention of enterprise technology leaders
Organizations around the world will accelerate enterprise technology investment in 2020, leveraging digital improvements to make them more competitive, improve connections …
![bulb](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102734/bulb-400x200.jpg)
Analysts explore the top strategic technology trends for 2020
Top ten strategic technology trends that organizations need to explore in 2020 have been identified. Gartner defines a strategic technology trend as one with substantial …
![world](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105959/world-400x200.jpg)
Cybercrime is maturing, shifting its focus to larger and more profitable targets
Cybercrime is continuing to mature and becoming more and more bold, shifting its focus to larger and more profitable targets as well as new technologies. Data is the key …
![blocks](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095834/blocks-400x200.jpg)
Unlocking the future of blockchain innovation with privacy-preserving technologies
The origins of blockchain as many are familiar with it today can be traced back to the Bitcoin whitepaper, first published in 2008 by Satoshi Nakamoto, which offered a vision …
![person](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094843/person-400x200.jpg)
Mobile ID schemes take the lead over digital identity cards
The number of people using government-issued digital identity credentials will grow by over 150% from an expected 1.7 billion in 2019 to over 5 billion in 2024, according to …
![icosahedral](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103458/icosahedral-400x200.jpg)
Is there a weak link in blockchain security?
Recent research revealed that blockchain is set to become ubiquitous by 2025, entering mainstream business and underpinning supply chains worldwide. This technology is set to …
![crypto currency](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101455/crypto_currency2-400x200.jpg)
A wave of regulation is coming to the cryptocurrency economy
There is a concerning trend of cross-border crypto payments leaving U.S. exchanges and entering offshore and untraceable wallets, a CipherTrace report reveals. In the twelve …
![blockchain](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100809/blockchain-400x200.jpg)
Research on private key generation reveals theft of ETH funds from accounts with discoverable keys
Researchers at Independent Security Evaluators (ISE) have discovered 732 actively used private keys on the Ethereum blockchain. In their new study titled Ethercombing, ISE …
Featured news
Resources
Don't miss
- It’s time to secure the extended digital supply chain
- SysReptor: Open-source penetration testing reporting platform
- Microsoft fixes two actively exploited zero-days (CVE-2025-21418, CVE-2025-21391)
- 8Base ransomware group leaders arrested, leak site seized
- Apple fixes zero-day flaw exploited in “extremely sophisticated” attack (CVE-2025-24200)